ManageEngine Recognized in the 2018 Gartner MQ for Security Information and Event Management
January 10, 2019
Share this

ManageEngine has been positioned in the Gartner 2018 Magic Quadrant for Security Information and Event Managementi (SIEM).

This is the third consecutive year that ManageEngine's SIEM solution, Log360, has been named in this report. A complimentary copy of the complete report is available at www.manageengine.com/log-management/gartner-siem-mq.html.

More enterprises than ever are jumping on the cloud bandwagon, as cloud services offer the speed and agility that's required to meet business goals efficiently. However, ensuring security for cloud and hybrid environments is still a challenge for many enterprises. SIEM solutions simplify this task by offering enterprises comprehensive security features for their IT environments from a single console.

"We at ManageEngine are focused on building a future-oriented, comprehensive yet simple-to-use SIEM solution that will meet the rapidly growing demands of enterprise security," said Manikandan Thangarajan, Director of Product Management at ManageEngine. "We want to equip contemporary and future SOCs with the ability to detect, respond to and mitigate sophisticated attacks with an advanced threat intelligence platform as well as seamlessly orchestrate security operations across on-premises, cloud and hybrid platforms. We believe Gartner's recognition is honoring our efforts on this constant evolution."
Highlights of Log360

Log360, ManageEngine's exhaustive yet easy-to-use SIEM solution, helps enterprises ensure security across on-premises and cloud environments. Log360's critical functions include its ability to be quickly deployed; capability to automatically discover and configure Windows infrastructure, network devices, and SQL databases for monitoring; ability to capture information using various methods; and use of automatic parsing.

In addition to being positioned in the Magic Quadrant for SIEM, Gartner also named ManageEngine (Log360) in its 2018 Critical Capabilities for Security Information and Event Managementi report, which extends the Magic Quadrant analysis for deeper insights into providers' product and service offerings.

Log360 features include:

- Support for cloud monitoring: Analyze and detect suspicious events in IaaS platforms such as Amazon Web Services (AWS) and Azure in addition to SaaS applications such as Salesforce.

- Security auditing of physical and virtual infrastructures: Audit volumes of log data generated by various sources - including Windows and Linux servers, EMC and NetApp file servers, Active Directory environments, and VMware and Hyper-V machines - and turn that data into actionable insights.

- Intuitive and real-time security analytics: Use over 1,000 prepackaged report templates, interactive dashboards, and alert profiles, all of which cover the basic security, auditing and compliance needs of most enterprises. These components provide immediate insight into suspicious events and facilitate quick decision-making.

- Advanced threat detection: Detect malicious traffic in the network and stop potential network intrusions at their earliest stages thanks to STIX/TAXII threat feed processors and a global IP threat database. Log360's real-time correlation engine can detect indicators of compromise and attacks across different resources in a network to help preempt security threats.

- User behavior analytics: Deter insider attacks thanks to the Log360 user behavior analytics module, which is powered by machine learning. It quickly spots user behavior anomalies such as abnormal user logons, logon failures, unusual user accesses to critical resources, and more.

- Streamlined incident management system: Track the resolution of detected incidents and ensure accountability in the incident resolving process with Log360's built-in incident management module. This module also supports raising tickets in help desk software - such as ServiceNow, ManageEngine ServiceDesk Plus, JIRA, Zendesk and more - for every threat detected in the network.

Share this

The Latest

March 21, 2019

Achieving audit compliance within your IT ecosystem can be an iterative process, and it doesn't have to be compressed into the five days before the audit is due. Following is a four-step process I use to guide clients through the process of preparing for and successfully completing IT audits ...

March 20, 2019

Network performance issues come in all shapes and sizes, and can require vast amounts of time and resources to solve. Here are three examples of painful network performance issues you're likely to encounter this year, and how NPMD solutions can help you overcome them ...

March 19, 2019

"Scale up" versus "scale out" doesn't just apply to hardware investments, it also has an impact on product features. "Scale up" promotes buying the feature set you think you need now, then adding "feature modules" and licenses as you discover additional feature requirements are needed. Often as networks grow in size they also grow in complexity ...

March 18, 2019

Network Packet Brokers play a critical role in gaining visibility into new complex networks. They deliver the packet data and information IT and security teams need to identify problems, recognize security issues, and ensure overall network performance. However, not all Packet Brokers are created equal when it comes to scalability. Simply "scaling up" your network infrastructure at every growth point is a more complex and more expensive endeavor over time. Let's explore three ways the "scale up" approach to infrastructure growth impedes NetOps and security professionals (and the business as a whole) ...

March 15, 2019

Loyal users are the key to your service desk's success. Happy users want to use your services and they recommend your services in the organization. It takes time and effort to exceed user expectations, but doing so means keeping the promises we make to our users and being careful not to do too much without careful consideration for what's best for the organization and users ...

March 14, 2019

What's the difference between user satisfaction and user loyalty? How can you measure whether your users are satisfied and will keep buying from you? How much effort should you make to offer your users the ultimate experience? If you're a service provider, what matters in the end is whether users will keep coming back to you and will stay loyal ...

March 13, 2019

What if I said that a 95% reduction in the amount of IT noise, 99% reduction in ticket volume and 99% L1 resolution rate are not only possible, but that some of the largest, most complex enterprises in the world see these metrics in their environments every day, thanks to Artificial Intelligence (AI) and Machine Learning (ML)? Would you dismiss that as belonging to the realm of science fiction? ...

March 12, 2019
As a consumer, when you order products online, how do you expect them to get delivered? Some key requirements are: the product must arrive on time, well-packed, and ultimately must give you an easy gateway to return it if it is not as per your expectations. All this has been made possible via a single application. But what if this application doesn't function the way you want or cracks down mid-way, or probably leaks off information about you to some potential hackers? Technical uncertainty and digital chaos are the two double-edged swords dangling over this billion-dollar ecommerce market. Can Quality Assurance and Software Testing save application developers from this endless juggle? ...
March 11, 2019

Of those surveyed, 96% of organizations have a digital transformation strategy, with 57% approaching it as an enterprise-wide priority, with a clear emphasis on speed of business, costs, risk, and customer satisfaction, according to IDC’s Aligning IT Strategies and Business Expectations for Digital Transformation Success, sponsored by EasyVista ...

March 08, 2019

One of my ongoing areas of focus is analytics, AIOps, and the intersection with AI and machine learning more broadly. Within this space, sad to say, semantic confusion surrounding just what these terms mean echoes the confusions surrounding ITSM ...